ISA 562 Assignment 3 Due before class: 07/21/08. No late submissions please. Please submit electronic copy to: mxu@gmu.edu with subject line “ISA562 HM3” This is an individual assignment. You are required to solve it on your own using whatever material you like. Please sign and submit the following honor code statement with your solution: I have not taken any help on this examination from anyone and not provided any help to anyone. The solution has been entirely worked out by me and represents my individual effort. Please submit a typed solution with the signed honor code statement. 1. Following the notations introduced in class, translate those messages into English: (30pt) (a) AB: {m || r1}kAB || h(m || r1) (b) AB: {m1}kAB || {m2}kAB || h(m1 || m2) (c) AB: {m || r1}eB || {m || r1}dA (d) AB: {m || r1}kAB || {h( m || r1 )}dA (e) AB: {m || r1 || {h(m || r1)}dA}ks || {ks || r2}eB 2. Consider an SSL handshake (RSA one-way, as discussed in class). (20pt) (a) Suppose an attacker has intercepted all messages sent by the client during a former SSL handshake. The attacker now replays the messages to the server (and ignore whatever the server sends back). Describe when and why the server will detect this attack. (b) Now the attacker changes his strategy. He/she ONLY replays the messages in the first three rounds (that is, up to ‘client key exchange’), but he/she repeats this replay for many times. What is the attacker’s intention? (Hint: consider what the server would do) 3. Suppose Alice and Bob want to establish a shared secret key. They agree on the following: n=353 and g=3; Alice chooses Xa=97; Bob chooses Xb=233. Derive the public keys for both (Ta & Tb) as well as the shared secret key (K). (10pt) 4. Design a Role-based access control system for an organization with the following requirements. That is, answer the questions following the story (40pt) The story: Any branch of the GMU bank consists of customers, cashiers, a manager and auditors. 1. By default, the GMU president is an auditor of the Fairfax branch. 2. A bank manager or a cashier cannot become an auditor. 3. Any person with a valid SSN may become a customer, including all bank employees (consisting of auditors, cashiers, and a manager) 4. A manager may become a cashier temporarily for a day, but may give up the manager’s duty for that day, provided that another cashier becomes the manager for that day. Then, if the permanent manager had approved any transactions carried out by that cashier (who become manager) cannot approve any transaction of the permanent manager’s accounts. 5. An auditor may never become a cashier or a manager. 6. A cashier or the manager must relinquish that duty temporarily in order for them to do their own customer transactions. 7. Alice_1, ……, Alice_27 are customers of the Fairfax branch of the bank. Lloyd (who holds a joint account with Alice_15) is a manager and Danny and Cindy are cashiers at the Fairfax bank. The current GMU president is Alain. 8. No employee may approve any activity on an account with his/her name. 9. An auditor may audit any transaction and balance books. 10. A cashier may debit or credit any customer account, provided the customer submits a written permission. 11. An account may be owned by a single customer or jointly by two of them. 12. A joint account transfer has to be approved by the manager. Questions: 1. What are the roles of RBAC system that models the bank: 2. What are the permissions in the RBAC system? 3. Who are the subjects of the RBAC system? 4. What is the Role-to-permission map? 5. What is the Subject-to-role-map? 6. What are the static constraints? 7. What are the dynamic constraints? 8. If Lloyd had approved a transaction carried out by Danny for another, and now wants to do a transaction on the account he holds jointly with Alice_15, who should become the temporary manager?